If this is your first visit, be sure to
check out the Forum Rules by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.

Using rainbow tables to crack wpa

I downloaded the rainbow tables available on the church of wifi website, extracted the files, and am now presented with a .rt file that i cannot get loaded into cowpatty or aircrack. I have googled for a solution also searched the forums to no avail. Any suggestions?

The purpose of this:

The purpose of this activity is to educate myself. Not to pay someone to do it for me! I suppose the church of wifi tables are useless to cowpatty and aircrack am i correct? Or is there another program I can use these tables for to crack wpa?

The purpose of this activity is to educate myself. Not to pay someone to do it for me! I suppose the church of wifi tables are useless to cowpatty and aircrack am i correct? Or is there another program I can use these tables for to crack wpa?

Education would be for your own WPA point and wouldn't require anything but your own time to create a genpmk list one should think. Have a look for gotmilk and his videos on the topic, or even Xploitz videos - they show you how to create and use tables.

.rt by the way makes me think of rcrack - which isn't for wifi.

Still not underestimating the power...

There is no such thing as bad information - There is truth in the data, so you sift it all, even the crap stuff.

The purpose of this activity is to educate myself. Not to pay someone to do it for me! I suppose the church of wifi tables are useless to cowpatty and aircrack am i correct? Or is there another program I can use these tables for to crack wpa?

The Church of WiFi tables are specifically designed for use with coWPAtty.

Collected all necessary data to mount crack against WPA/PSK passphrase.
Starting dictionary attack. Please be patient.
Invalid word length: -33
Found a record that was too short, this shouldn't happen in practice!
Unable to identify the PSK from the dictionary file. Try expanding your
passphrase list, and double-check the SSID. Sorry it didn't work out.

Collected all necessary data to mount crack against WPA/PSK passphrase.
Starting dictionary attack. Please be patient.
Invalid word length: -33
Found a record that was too short, this shouldn't happen in practice!
Unable to identify the PSK from the dictionary file. Try expanding your
passphrase list, and double-check the SSID. Sorry it didn't work out.

1 passphrases tested in 0.03 seconds: 29.48 passphrases/second

Any suggestions?

I told you before to create your own list. If you had done so you would have saved yourself the embarrassment of confirming for us all what I postulated earlier - that you are using the wrong tables for trying to crack WPA - those tables are meant to be used against LM hashes and won't work for WPA or the hashing algorithm therein.

Edit: Oh, and they're not from the CoW either, they're from the rainbow table project.

Still not underestimating the power...

There is no such thing as bad information - There is truth in the data, so you sift it all, even the crap stuff.